Skip to content

Latest commit

 

History

History
76 lines (56 loc) · 3.29 KB

config_overview.rst

File metadata and controls

76 lines (56 loc) · 3.29 KB

Configuration Overview

Beyond the default configuration settings, you can configure a rich array of options to suit your workflow. Here are areas that are commonly configured when using Jupyter Notebook:

  • Jupyter's common configuration system <configure_common>
  • Notebook server <configure_nbserver>
  • Notebook front-end client <configure_nbclient>
  • Notebook extensions <configure_nbextensions>

Let's look at highlights of each area.

Jupyter's Common Configuration system

Jupyter applications, from the Notebook to JupyterHub to nbgrader, share a common configuration system. The process for creating a configuration file and editing settings is similar for all the Jupyter applications.

Notebook server

The Notebook server runs the language kernel and communicates with the front-end Notebook client (i.e. the familiar notebook interface).

  • Configuring the Notebook server

    To create a jupyter_notebook_config.py file in the .jupyter directory, with all the defaults commented out, use the following command:

    $ jupyter notebook --generate-config

    Command line arguments for configuration <config> settings are documented in the configuration file and the user documentation.

  • Running a Notebook server <working_remotely>
  • Related: Configuring a language kernel to run in the Notebook server enables your server to run other languages, like R or Julia.

Notebook front-end client

  • How front-end configuration works <frontend_config>
    • Example: Changing the notebook's default indentation setting <frontend_config>
    • Example: Restoring the notebook's default indentation setting <frontend_config>
  • Persisting configuration settings <frontend_config>

Notebook extensions

Security in Jupyter notebooks: <notebook_security> Since security policies vary from organization to organization, we encourage you to consult with your security team on settings that would be best for your use cases. Our documentation offers some responsible security practices, and we recommend becoming familiar with the practices.